Adopting Data Mining Techniques on the Recommendations of Library Collections

Size: px
Start display at page:

Download "Adopting Data Mining Techniques on the Recommendations of Library Collections"

Transcription

1 Adopting Data Mining Techniques on the Recommendations of Library Collections Shu-Meng Huang a, Lu Wang b and Wan-Chih Wang c a Department of Information Management, Hsing Wu College, Taiwan (simon@mail.hwc.edu.tw) b, c Graduate School of Management Sciences, Tamkang University, Taiwan (pheobemimilucky@hotmail.com) Correspondence: Shu-Meng Huang a Abstract In this research, the researchers explored not only the cluster of the readers with similar characteristics, but also the connection between the readers and the book collections of the library by using Data Mining techniques. By doing this, the library will be able to improve the interaction with its readers, and further increase the usage of library collections. The Modified Attribute-Oriented Induction (MAOI) method was introduced to deal with the multi-valued attribute table and further sort the readers into different clusters. Instead of using concept hierarchy and concept trees, MAOI method implemented the concept climbing and generalization of multi-valued attribute table with Boolean Algebra and modified Karnaugh Map, and described the clusters with concept description. On the other hand, the Chinese books in the library collections were classified into four groups with New Classification Science for Chinese Libraries (CCL). Not only the attributes of readers, but also the attributes of library collections borrowed by readers are included in the multi-valued attribute table. After the completion of induction, the reading preferences of the readers with the same characteristics can be learned. Keywords: Data Mining, Recommendations, MAOI, Multi-Valued Attribute I. INTRODUCTION Potential readers seeking information in a library often face a daunting, time and energy-consuming task. Given the immense body of data gathered in modern libraries, it can be difficult for these readers to quickly sift through the mass of information to uncover what they need. This difficulty can affect how often, and how willingly, readers make use of library s vast resources. Some studies[1][2], have indicated that one of the key aspects of a library s service and marketing success is how well they actively provide information to readers by means of personal service technology based on readers personal preferences and needs. In recent years, many e-commerce websites have adopted personal recommender information systems in an effort to increase their interaction with customers to generate a higher rate of return patronage[3][4]. Take YouTube as an example, the Recommended for you column provides viewers information related to the videos they just browsed;and on they analyze the pages customers have browsed, then actively recommend the books the customers might be interested. Thus, the application of this concept in the library must be able to improve the relationship between the library and the readers. In this research, a method of concept description in Data Mining was adopted Modified Attribute-Oriented Induction[5], to sort the readers into different clusters. Each cluster includes readers with similar characteristics and preferences. II. RELATED STUDIES There are mainly two recommender systems applied in online stores [6]: for the merchandise that customers would consume more often, such as books or movies, and for the merchandise that customers would not consume so often, such as cars or computers. The first recommender system analyzes the consumption records of the customers to uncover the customers preferences, and then provide advices. It usually adopts Data Mining technology, as well as personal service. But for the merchandise that customers don t buy so often, the advices based on the earlier consumption records may not achieve the expected results. The situation of readers making use of the collections of the library is similar to the consumption of the merchandise that customers buy more often. Therefore, many studies related to library recommendations adopt Data Mining technology to discover the relationship between readers and books. 2.1 Data Mining When facing massive data, Data Mining provides powerful and effective tools to transform the data into useful information and knowledge[7][8]. Table 1 is a summary of the functions and technologies frequently used in Data Mining[9]. The Market Basket Analysis is also named Association Rule Analysis. This technology can explore the connections between attributes or objects. And it s an appropriate means to dig the relationships between readers and books. But there are mass records in the library. When considering about analysis complication, execution efficiency and recommendation results, researchers

2 usually perform the grouping of the readers before analysis. Yu-Ling Cheng (2002) Jien-Hwa Tsao(2003) Chang-Ting Yang(2007) classified the readers based directly on reader s department. Ching-Shium Chen (2000) Yuan-Jing Zhang (2001) Chien-Yu Chen (2009) clustered the readers with Cluster Detection. Kuan-Hua Sun(2000) adopted Multilevel Association Rule Mining to discover the different characteristics of the readers who have different preferences. Yu-Ling Cheng (2003) adopted Memory-Based Reasoning to group the readers with the same background. Some of the methods adopted in the above mentioned studies are complicated, meanwhile, some are brief. But most of them only can deal with single-valued data. When facing multi-valued data, lots of pre-processing work must be done for further analysis. In this research, Modified Attribute-Oriented Induction, which was proposed by Shu-Meng Huang (2010), was adopted, to induct and sort the multi-valued data, such as reader s department and year. Table 1. Functions and technologies of Data Mining Function Affinity Classification Estimation Prediction Clustering Description Technology grouping Statistics ˇ ˇ ˇ ˇ ˇ ˇ Market Basket Analysis ˇ ˇ ˇ ˇ Memory-Based Reasoning ˇ ˇ ˇ ˇ Genetic algorithm ˇ ˇ Cluster Detection Link Analysis ˇ ˇ ˇ ˇ Decision Tree ˇ ˇ ˇ ˇ Artificial Neural Network ˇ ˇ ˇ ˇ ˇ 2.2 Modified Attribute-Oriented Induction (MAOI) Attribute-Oriented Induction Approach (AOI)was proposed in 1991 [10]. It appears in a form of described Data Mining[11], and can deal with different kinds of knowledge rules efficiently, such as characteristic rules, discrimination rules, quantitative rules, and data evolution regularities [12]. This approach is one of the most classification scheme in Data Mining [13]. The basic concept and steps of AOI include [14]: (1) Concept Hierarchy (2) Attribute-Removal (3) Concept-Tree climbing (4) Vote propagation (5) Attribute-Threshold Control (6) Rule transformation Though it s convenient making use of AOI to induct data into simple rule description, and some complicated procedures for data processing are eliminated as well. But different people make different Concept Hierarchies, and different definition leads to different results. The confidence would be low, if there is no apparent Concept Hierarchy between attributes. Besides, AOI only can deal with single-valued attribute data [3]. Therefore Shu-Meng Huang (2010) combine the concepts of Boolean bit and simplified Karnaugh map with AOI, named MAOI, to deal with multi-valued attribute data. Figure 1 presents the steps of MAOI. Table 2. is a database of high-frequent-crime areas in [3]. It s multi-valued attribute database. The researcher explained the steps of MAOI with it. Attribute table A B C Boolean Bit Modified K-map Induction Figure 1. The induction steps of Modified AOI Boolean Bit Transformation To decide a value s Boolean bit, a cutting point must be defined first. Taking the mean value of the attribute as the cutting point for that attribute, all the values in that attribute can be transformed. That means, if a value is

3 bigger than or equal to the cutting point, it s Boolean bit is 1. If a value is smaller than the cutting point, it s Boolean bit is 0. Table 3. presents the result after transformation. Area ID Table 2. Database of high-frequent-crime areas Gender Age Education <g 1,30> <g 2,70> <g 1,45> <g 2,55> <g 1,65> <g 2,35> <g 1,40> <g 2,60> <g 1,35> <g 2,65> <g 1,60> <g 2,40> <g 1,20> <g 2,80> <g 1,70> <g 2,30> <g 1,40> <g 2,60> <a 1,20><a 2,30> <a 1,25><a 2,35> <a 3,40> <a 1,35><a 2,25> <a 3,40> <a 1,20><a 2,40> <a 3,40> <a 1,30><a 2,20> <a 1,25><a 2,25> <a 1,10><a 2,40> <a 1,30><a 2,40> <a 3,30> <a 1,20><a 2,10> <a 3,70> <e 1,20><e 2,10> <e 3,40><e 4,30> <e 1,15><e 2,10> <e 3,35><e 4,30> <e 1,30><e 2,40> <e 3,10><e 4,20> <e 1,10><e 2,10> <e 3,40><e 4,40> <e 1,25><e 2,5> <e 3,40><e 4,30> <e 1,20><e 2,15> <e 3,35><e 4,30> <e 1,30><e 2,5> <e 3,35><e 4,30> <e 1,10><e 2,40> <e 3,40><e 4,10> <e 1,20><e 2,20> <e 3,30><e 4,30> <g 10 1,35> <a 1,20><a 2,30> <e 1,20><e 2,10> <g 2,65> <e 3,40><e 4,30> In this table, g1 mean male, g2 means female; a1means yang man, a2 means adult, a3 means old man; e1means primary education, e2 means secondary education, e3 means university education, e4 means institute of education Table 3.Database after Boolean bit transformation Area ID Gender Age Education Karnaugh Map of Attribute Age. a2,a3 a Figure 2. The Karnaugh Map of Age From Figure 2, it shows that 001 and 011 can be combined. That is, 001,011 0_1 _ means don t care With the same step, the education attribute can be simplified: 0011,1011 _ Data Replacement Table 4. presents the feature tha attribute values have been replaced with the simplified values inducted from Karnough Map. Table 4.Database after Karnaugh Map simplification Area ID Gender Age Education _1 _ _1 _ _1 _ _1 _ _1 _ _1 _ _1 _ _1 _ Scan and Recount Scan the database again, and count the rows with the same attribute values. There are 4 rules in table 5. Table 5. Database after scan and recount Gender age Education vote _1 0_ _1 _ Karnaugh Map Concept Karnaugh Map presents the simplification of Boolean Algebra in the way of intuitive graph. But to avoid double counting, the researcher simplified it. Only a2,a3 the nearest neighbors that have the largest added value will a1 be combined and simplified. Figure 2. is the The Descriptive Rules In table 5, the number 1 rule has the highest vote value. It can be described as: {<g 1,L><g 2,H>} {<a 1,L><a 3,H>} {<e 1,L><e 3,H> <e 4,H>} 70%

4 The interpretation of the rule: 70% of high-frequent-crime areas have more females, elderly people, university students and graduate students. III. RESEARCH METHOD 3.1 Research Process In this research, all the data came from a library in a college. After data selection, matching, pruning and replacement, the data was inducted by MAOI to generate descriptive rules. Figuer 3. is the research process. Figure 3. Research process 3.2 The Multi-Valued Table The data selected contains all the college students library records in Except some data pre-processing, the twelve departments were divided into three academies, and the library collections were divided into four groups by their book numbers according to New Classification Science for Chinese Libraries(CCL). Table 6. presents a database ready for further analysis. Attribute A stands for academy; a1 is the first academy, including departments of Accounting Information, Business of Administration, International Trade and Business, Marketing and Distribution Management, and Finance; a2 is the second academy, including the departments of Tourism Management, Hospitality Management, Travel Management, and Applied English; a3 is the third academy, including the departments of Information Management, Information Technology and Information Communication. Attribute B stands for student s year in the college; b1 is Freshman; b2 is Sophomore; b3 is Junior; b4 is sinor. Attribute C stands for gender; c1 is male, and c2is female. Attribute D stands for student s grade; d1is 90~100; d2 is 80~89; d3 is 70~79; d4 is under 69.Attribute E stands for the classification of the library collections; e1 is 000~299; e2 is300~499; e3 is 500~799; e4 is 800~999. Table 6. Database of student s records in the library Month ID A B C D E <a1,101><a2,111> <a3,83> <a1,117 ><a2,115> <a3,81> <a1,207><a2,191> <a3,143> <a1,203><a2,177> <a3,48> <a1,156><a2,154> <a3,102> <a1,136><a2,110> <a3,93> <a1,11><a2,4> <a3,19> <a1,6><a2,9> <a3,18> <a1,147><a2,151> <a3,117> <b1,2><b2,91> <b3,68><b4,134> <b1,1><b2,96> <b3,67><b4,149> <b1,3><b2,160> <b3,147><b4,231> <b1,3><b2,127> <b3,155><b4,240> <b1,1><b2,110> <b3,123><b4,178> <b1,3><b2,106> <b3,118><b4,112> <b1,0><b2,3> <b3,6><b4,25> <b1,0><b2,6> <b3,6><b4,21> <b1,92><b2,114> <b3,114><b4,95> <c1,134> <c2,161> <c1,167> <c2,146> <c1,295> <c2,246> <c1,252> <c2,176> <c1,194> <c2,218> <c1,178> <c2,161> <c1,21> <c2,13> <c1,22> <c2,11> <c1,176> <c2,239> <d1,9><d2,96> <d3,124><d4,66> <d1,28><d2,143> <d3,74><d4,68> <d1,45><d2,198> <d3,206><d4,92> <d1,38><d2,195> <d3,89><d4,106> <d1,56><d2,126> <d3,143><d4,87> <d1,31><d2,94> <d3,135><d4,79> <d1,0><d2,27> <d3,4><d4,3> <d1,2><d2,19> <d3,8><d4,4> <d1,48><d2,149> <d3,132><d4,86> <e1,36 ><e2,98 > <e3,75><e4, 194> <e1,44><e2,119> <e3,77><e4,201> <e1,98><e2,186> <e3,144><e4,380> <e1,87><e2,226> <e3,147><e4,294> <e1,62><e2,161> <e3,115><e4,248> <e1,67><e2,134> <e3,79><e4,226> <e1,5><e2,24> <e3,7><e4,6> <e1,3><e2,19> <e3,5><e4,8> <e1,70><e2,140> <e3,82><e4,282>

5 <a1,170><a2,199> <a3,131> <a1,177><a2,206> <a3,143> <a1,195><a2,192> <a3,152> <b1,78><b2,175> <b3,149><b4,98> <b1,76><b2,214> <b3,139><b4,97> <b1,121><b2,184> <b3,139><b4,95> <c1,269> <c2,231> <c1,253> <c2,273> <c1,285> <c2,254> <d1,70><d2,123> <d3,165><d4,142> <d1,63><d2,202> <d3,194><d4,67> <d1,76><d2,211> <d3,176><d4,76> <e1,69><e2,213> <e3,121><e4,302> <e1,67><e2,183> <e3,147><e4,331> <e1,63><e2,213> <e3,131><e4,324> Boolean Bit Transformation In the grid 1A, the data is <a1,101> <a2,111> <a3,83>. The total of these values is 295, and the average number is 295/3=98. When taking 98 as the cutting point, because (101>98.3), (111>98.3), and (83<98.3), the Boolean bit of 1A becomes 110. Repeat the steps mentioned above, we can transform all the attribute values into Boolean bit, as shown in table 7. But column E is a special column. Because every student can borrow more than one kind of books, we define the cutting point to be quarter of the number of the students in the month. That means the cutting point of column E equals to the cutting point of column B or D. Table 7. Database after Boolean bit transformation M. ID A B C D E Attribute B b1,b2 d1,d2 e1,e2 b3,b Attribute D d3,d4 Attribute E e3,e4 0111, _ , _ , _ Karnaugh Map Concept The Karnaugh maps of Attribute A, B, D, E are presented in figure4. a1 Attribute A a2,a ,110 1_0 Figure 4. The Karnaugh Map of Attribute A,B,D,E Data replacement Replace the attribute values with the rules inducted in figure 4 with Karnaugh Map, we complete table8. Table 8. Database after Karnaugh Map simplification M. ID A B C D E 1 1_ _0 01_1 2 1_ _0 01_1 3 1_0 011_ 10 01_0 01_1 4 1_0 011_ 10 01_0 01_1 5 1_0 011_ 01 01_0 01_1 6 1_0 011_ 10 01_0 01_ _ _0 0100

6 9 1_0 011_ 01 01_0 01_1 10 1_0 011_ _1 11 1_0 011_ 01 01_0 01_1 12 1_0 011_ 10 01_0 01_ Scan and Recount Table 9. Database after scan and recount A B C D E vote library can actively provide readers with appropriate recommendation, and consider the purchase strategy of the collections. sets of applications and a wider range of multi-valued tables, as the purposes to verify this algorithm and to discover the generalized knowledge from Relational Databases. 1 1_0 011_ 10 01_0 01_ _0 011_ 01 01_0 01_ _ _ _0 01_ _ _0 01_ _0 011_ _ The descriptive rules From table 9, the sum of the votes for rule number1, 2, and 3 is 9. Thus, rule number 1, 2, and 3 have included 75% of the data. And they are the 3 highest inducted rules in this research. They can be described as the following: (1){<a1,H><a3,L>} {<b1,l><b2,h><b3,h>} {<c1,h ><c2,l>} {<d1,l><d2,h><d4,>l} {<e1,l><e2,h ><e4,h>} 33.3% It means that there are about 33.3% readers who are males and in the second or third year of the first academy. Their grades are about 80~89. Their reading preference is on book number 300~499 and 800~999. (2) {<a1,h><a3,l>} {<b1,l><b2,h><b3,h>} {<c1,l><c2,h>} {<d1,l><d2,h><d4,>l} { <e1,l><e2,h><e4,h>} 25.0% It means that there are about 25% readers who are females and in the second or third year of the first academy. Their grades are about 80~89. Their reading preference is on book number 300~499 and 800~999. (3) {<a1,l><a2,l><a3,h>} {<b1,l><b2,l><b3,l> <b4,h>} {<c1,h><c2,l>} {<d1,l><d2,h><d 4,>L} {<e1,l><e2,h><e3,l><e4,l>} 16.6% It means that there are about 16.6% readers who are females and in the fourth year of the third academy. Their grades are about 80~89. Their reading preference is on book number 300~499. IV. Conclusion To improve library s service and marketing success, the readers needs should be satisfied. There are lots of methods proposed to analyze the relationships between readers and library collections. Most of them only can handle the single-valued attributes. But in our daily life, many information appear as multi-valued attributes. MAOI can induct multi-valued attributes directly, and present the results briefly and descriptively. In this research, 3 rules were uncovered to explain the characteristics of the readers and their reading preferences. They have accounted for about 75% information. Therefore, it s a successful induction. The

7 REFERENCE [1]Jun-Rong Huang, Using clusters to find the most adaptive recommendations of books Journal of Educational Media & Library Science, 43:3, pp , 2006 [2]Ou, J., Lin, S. and Li, J., The Personalized Index Service System in Digital Library, Proc. of the Third International Symposium on Cooperative Database Systems for Advanced Applications, pp92-99, 2001 [3]J. B. Schafer, J. A. Konstan, and J. Riedl, E-Commerce Recommendation Applications, Data Mining and Knowledge Discovery, 5(1), pp , 2001 [4]A. Ansari, S. Essengaier, and R. Kohli, Internet Recommendation Systems, Journal of Marketing Research, 37(3), 2000 [5]Shu-Meng Huang, A study on the Modified Attributed-Oriented-Induction Algorithm of Mining the Multi-Value Attribute Data, ICERM, pp62, 2010 [6]W.P. Lee, C.H. Liu, and C.C. Lu, Intelligent agentbased systems for personalized recommendations in Internet commerce, Expert Systems with Applications, vol. 22, no.4, pp , 2002 [7]M. S. Chen, J. Han and P. S. Yu, Data Mining : An Overview From a database Perspective, IEEE, Transactions on Knowledge and Data Engineering, Vol. 8, No.6, pp ,1996 [8]Fayyad, U.M., Data Mining and Knowledge Discovery :Making Sense Out of Data, IEEE Expert, Vol.11, Issue 5, pp20-25, 1996 [9]M.J.A. Berry and G. Linoff, Data Mining Techniques:For Marketing, Sales, and Customer Support, John Wiley & Sons [10]Y. Cai, N. Cercone, and J. Han, attribute-oriented induction in relational database, Knowledge Discovery in Databases,Ch 12, AAAI/MIT Press [11]Jiawei Han and Micheline Kamber, Data Mining : Concepts and Techniques (Second Edition), Morgan Kaufmann Pub, 2006 [12]J. Han, Y. Cai, and N. Cercone, Knowledge Discovery in Databases : An Attribute-Oriented Approach, In Proceedings of the 18 th VLDB Conference, Vancouver, British Columbia, Canada. Pp , 1992 [13]Yen-Liang Chen, Ching-Cheng Shen, Mining generalized knowledge from ordered data through attribute-oriented induction tecniques. European Journal of Operational Research, 166, pp , 2005 [14]J. Han, Y. Cai and N. Cercone, Data-Driven Discovery of Quantitative Rules in Relational Database, IEEE Transaction on Knowledge and Data engineering, Vol.5, No.1, February 1993

Ubiquitous Computing and Communication Journal (ISSN )

Ubiquitous Computing and Communication Journal (ISSN ) A STRATEGY TO COMPROMISE HANDWRITTEN DOCUMENTS PROCESSING AND RETRIEVING USING ASSOCIATION RULES MINING Prof. Dr. Alaa H. AL-Hamami, Amman Arab University for Graduate Studies, Amman, Jordan, 2011. Alaa_hamami@yahoo.com

More information

Generalized Knowledge Discovery from Relational Databases

Generalized Knowledge Discovery from Relational Databases 148 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009 Generalized Knowledge Discovery from Relational Databases Yu-Ying Wu, Yen-Liang Chen, and Ray-I Chang Department

More information

Data Mining Technology Based on Bayesian Network Structure Applied in Learning

Data Mining Technology Based on Bayesian Network Structure Applied in Learning , pp.67-71 http://dx.doi.org/10.14257/astl.2016.137.12 Data Mining Technology Based on Bayesian Network Structure Applied in Learning Chunhua Wang, Dong Han College of Information Engineering, Huanghuai

More information

Improved Frequent Pattern Mining Algorithm with Indexing

Improved Frequent Pattern Mining Algorithm with Indexing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.

More information

Building a Concept Hierarchy from a Distance Matrix

Building a Concept Hierarchy from a Distance Matrix Building a Concept Hierarchy from a Distance Matrix Huang-Cheng Kuo 1 and Jen-Peng Huang 2 1 Department of Computer Science and Information Engineering National Chiayi University, Taiwan 600 hckuo@mail.ncyu.edu.tw

More information

Understanding Rule Behavior through Apriori Algorithm over Social Network Data

Understanding Rule Behavior through Apriori Algorithm over Social Network Data Global Journal of Computer Science and Technology Volume 12 Issue 10 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Qingting Zhu 1*, Haifeng Lu 2 and Xinliang Xu 3 1 School of Computer Science and Software Engineering,

More information

An Improved Apriori Algorithm for Association Rules

An Improved Apriori Algorithm for Association Rules Research article An Improved Apriori Algorithm for Association Rules Hassan M. Najadat 1, Mohammed Al-Maolegi 2, Bassam Arkok 3 Computer Science, Jordan University of Science and Technology, Irbid, Jordan

More information

Study on the Application Analysis and Future Development of Data Mining Technology

Study on the Application Analysis and Future Development of Data Mining Technology Study on the Application Analysis and Future Development of Data Mining Technology Ge ZHU 1, Feng LIN 2,* 1 Department of Information Science and Technology, Heilongjiang University, Harbin 150080, China

More information

Using Gini-index for Feature Weighting in Text Categorization

Using Gini-index for Feature Weighting in Text Categorization Journal of Computational Information Systems 9: 14 (2013) 5819 5826 Available at http://www.jofcis.com Using Gini-index for Feature Weighting in Text Categorization Weidong ZHU 1,, Yongmin LIN 2 1 School

More information

Temporal Weighted Association Rule Mining for Classification

Temporal Weighted Association Rule Mining for Classification Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

The Objectivity Measurement of Frequent Patterns

The Objectivity Measurement of Frequent Patterns , October 20-22, 2010, San Francisco, USA The Objectivity Measurement of Frequent Patterns Phi-Khu Nguyen, Thanh-Trung Nguyen Abstract Frequent pattern mining is a basic problem in data mining and knowledge

More information

The Fuzzy Search for Association Rules with Interestingness Measure

The Fuzzy Search for Association Rules with Interestingness Measure The Fuzzy Search for Association Rules with Interestingness Measure Phaichayon Kongchai, Nittaya Kerdprasop, and Kittisak Kerdprasop Abstract Association rule are important to retailers as a source of

More information

A Hierarchical Document Clustering Approach with Frequent Itemsets

A Hierarchical Document Clustering Approach with Frequent Itemsets A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of

More information

2002 Journal of Software.. (stacking).

2002 Journal of Software.. (stacking). 1000-9825/2002/13(02)0245-05 2002 Journal of Software Vol13, No2,,, (,200433) E-mail: {wyji,ayzhou,zhangl}@fudaneducn http://wwwcsfudaneducn : (GA) (stacking), 2,,, : ; ; ; ; : TP18 :A, [1],,, :,, :,,,,

More information

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2 International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1,

More information

Arbee L.P. Chen ( 陳良弼 )

Arbee L.P. Chen ( 陳良弼 ) Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

Mining Quantitative Association Rules on Overlapped Intervals

Mining Quantitative Association Rules on Overlapped Intervals Mining Quantitative Association Rules on Overlapped Intervals Qiang Tong 1,3, Baoping Yan 2, and Yuanchun Zhou 1,3 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China {tongqiang,

More information

Data Mining in the Application of E-Commerce Website

Data Mining in the Application of E-Commerce Website Data Mining in the Application of E-Commerce Website Gu Hongjiu ChongQing Industry Polytechnic College, 401120, China Abstract. With the development of computer technology and Internet technology, the

More information

The k-means Algorithm and Genetic Algorithm

The k-means Algorithm and Genetic Algorithm The k-means Algorithm and Genetic Algorithm k-means algorithm Genetic algorithm Rough set approach Fuzzy set approaches Chapter 8 2 The K-Means Algorithm The K-Means algorithm is a simple yet effective

More information

DATA WAREHOUSING IN LIBRARIES FOR MANAGING DATABASE

DATA WAREHOUSING IN LIBRARIES FOR MANAGING DATABASE DATA WAREHOUSING IN LIBRARIES FOR MANAGING DATABASE Dr. Kirti Singh, Librarian, SSD Women s Institute of Technology, Bathinda Abstract: Major libraries have large collections and circulation. Managing

More information

International Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16

International Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16 The Survey Of Data Mining And Warehousing Architha.S, A.Kishore Kumar Department of Computer Engineering Department of computer engineering city engineering college VTU Bangalore, India ABSTRACT: Data

More information

Concept Tree Based Clustering Visualization with Shaded Similarity Matrices

Concept Tree Based Clustering Visualization with Shaded Similarity Matrices Syracuse University SURFACE School of Information Studies: Faculty Scholarship School of Information Studies (ischool) 12-2002 Concept Tree Based Clustering Visualization with Shaded Similarity Matrices

More information

Top-k Keyword Search Over Graphs Based On Backward Search

Top-k Keyword Search Over Graphs Based On Backward Search Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer

More information

Dynamic Clustering of Data with Modified K-Means Algorithm

Dynamic Clustering of Data with Modified K-Means Algorithm 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified K-Means Algorithm Ahamed Shafeeq

More information

A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm

A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm S.Pradeepkumar*, Mrs.C.Grace Padma** M.Phil Research Scholar, Department of Computer Science, RVS College of

More information

Chapter 28. Outline. Definitions of Data Mining. Data Mining Concepts

Chapter 28. Outline. Definitions of Data Mining. Data Mining Concepts Chapter 28 Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms

More information

A Novel method for Frequent Pattern Mining

A Novel method for Frequent Pattern Mining A Novel method for Frequent Pattern Mining K.Rajeswari #1, Dr.V.Vaithiyanathan *2 # Associate Professor, PCCOE & Ph.D Research Scholar SASTRA University, Tanjore, India 1 raji.pccoe@gmail.com * Associate

More information

An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining

An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining P.Subhashini 1, Dr.G.Gunasekaran 2 Research Scholar, Dept. of Information Technology, St.Peter s University,

More information

An Evolutionary Algorithm for Mining Association Rules Using Boolean Approach

An Evolutionary Algorithm for Mining Association Rules Using Boolean Approach An Evolutionary Algorithm for Mining Association Rules Using Boolean Approach ABSTRACT G.Ravi Kumar 1 Dr.G.A. Ramachandra 2 G.Sunitha 3 1. Research Scholar, Department of Computer Science &Technology,

More information

An Automatic Reply to Customers Queries Model with Chinese Text Mining Approach

An Automatic Reply to Customers  Queries Model with Chinese Text Mining Approach Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 15-17, 2007 71 An Automatic Reply to Customers E-mail Queries Model with Chinese Text Mining Approach

More information

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Design of student information system based on association algorithm and data mining technology

More information

A Classifier with the Function-based Decision Tree

A Classifier with the Function-based Decision Tree A Classifier with the Function-based Decision Tree Been-Chian Chien and Jung-Yi Lin Institute of Information Engineering I-Shou University, Kaohsiung 84008, Taiwan, R.O.C E-mail: cbc@isu.edu.tw, m893310m@isu.edu.tw

More information

A Customer Segmentation Mining System on the Web Platform

A Customer Segmentation Mining System on the Web Platform Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2000 Proceedings Americas Conference on Information Systems (AMCIS) 2000 A Customer Segmentation Mining System on the Web Platform

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

Application of Individualized Service System for Scientific and Technical Literature In Colleges and Universities

Application of Individualized Service System for Scientific and Technical Literature In Colleges and Universities Journal of Applied Science and Engineering Innovation, Vol.6, No.1, 2019, pp.26-30 ISSN (Print): 2331-9062 ISSN (Online): 2331-9070 Application of Individualized Service System for Scientific and Technical

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

Clustering of Data with Mixed Attributes based on Unified Similarity Metric

Clustering of Data with Mixed Attributes based on Unified Similarity Metric Clustering of Data with Mixed Attributes based on Unified Similarity Metric M.Soundaryadevi 1, Dr.L.S.Jayashree 2 Dept of CSE, RVS College of Engineering and Technology, Coimbatore, Tamilnadu, India 1

More information

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing

More information

CLASSIFICATION FOR SCALING METHODS IN DATA MINING

CLASSIFICATION FOR SCALING METHODS IN DATA MINING CLASSIFICATION FOR SCALING METHODS IN DATA MINING Eric Kyper, College of Business Administration, University of Rhode Island, Kingston, RI 02881 (401) 874-7563, ekyper@mail.uri.edu Lutz Hamel, Department

More information

Deep Web Content Mining

Deep Web Content Mining Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased

More information

Generating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K.

Generating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K. Generating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K.Mrithyumjaya Rao 3 1. Assistant Professor, Department of Computer Science, Krishna University,

More information

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China

More information

Categorization of Sequential Data using Associative Classifiers

Categorization of Sequential Data using Associative Classifiers Categorization of Sequential Data using Associative Classifiers Mrs. R. Meenakshi, MCA., MPhil., Research Scholar, Mrs. J.S. Subhashini, MCA., M.Phil., Assistant Professor, Department of Computer Science,

More information

Datasets Size: Effect on Clustering Results

Datasets Size: Effect on Clustering Results 1 Datasets Size: Effect on Clustering Results Adeleke Ajiboye 1, Ruzaini Abdullah Arshah 2, Hongwu Qin 3 Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang 1 {ajibraheem@live.com}

More information

Research and Improvement of Apriori Algorithm Based on Hadoop

Research and Improvement of Apriori Algorithm Based on Hadoop Research and Improvement of Apriori Algorithm Based on Hadoop Gao Pengfei a, Wang Jianguo b and Liu Pengcheng c School of Computer Science and Engineering Xi'an Technological University Xi'an, 710021,

More information

EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES

EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES D.Kerana Hanirex Research Scholar Bharath University Dr.M.A.Dorai Rangaswamy Professor,Dept of IT, Easwari Engg.College Abstract

More information

Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical application of VOD

Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical application of VOD World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical

More information

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2 Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu

More information

ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY

ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY A. Veeramuthu Department of Information Technology, Sathyabama University, Chennai India E-Mail: aveeramuthu@gmail.com ABSTRACT Generally,

More information

Lecture Topic Projects 1 Intro, schedule, and logistics 2 Data Science components and tasks 3 Data types Project #1 out 4 Introduction to R,

Lecture Topic Projects 1 Intro, schedule, and logistics 2 Data Science components and tasks 3 Data types Project #1 out 4 Introduction to R, Lecture Topic Projects 1 Intro, schedule, and logistics 2 Data Science components and tasks 3 Data types Project #1 out 4 Introduction to R, statistics foundations 5 Introduction to D3, visual analytics

More information

Data warehousing in telecom Industry

Data warehousing in telecom Industry Data warehousing in telecom Industry Dr. Sanjay Srivastava, Kaushal Srivastava, Avinash Pandey, Akhil Sharma Abstract: Data Warehouse is termed as the storage for the large heterogeneous data collected

More information

Medical Data Mining Based on Association Rules

Medical Data Mining Based on Association Rules Medical Data Mining Based on Association Rules Ruijuan Hu Dep of Foundation, PLA University of Foreign Languages, Luoyang 471003, China E-mail: huruijuan01@126.com Abstract Detailed elaborations are presented

More information

Binary Association Rule Mining Using Bayesian Network

Binary Association Rule Mining Using Bayesian Network 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Binary Association Rule Mining Using Bayesian Network Venkateswara Rao Vedula 1 and

More information

Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset

Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset M.Hamsathvani 1, D.Rajeswari 2 M.E, R.Kalaiselvi 3 1 PG Scholar(M.E), Angel College of Engineering and Technology, Tiruppur,

More information

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, pp. 27-32 DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY)

More information

The main purpose of load balancing is to

The main purpose of load balancing is to INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2005; 15: 311 319 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem.567 IP layer load balance using

More information

Data Mining Concepts

Data Mining Concepts Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms Sequential

More information

Data Mining. Chapter 1: Introduction. Adapted from materials by Jiawei Han, Micheline Kamber, and Jian Pei

Data Mining. Chapter 1: Introduction. Adapted from materials by Jiawei Han, Micheline Kamber, and Jian Pei Data Mining Chapter 1: Introduction Adapted from materials by Jiawei Han, Micheline Kamber, and Jian Pei 1 Any Question? Just Ask 3 Chapter 1. Introduction Why Data Mining? What Is Data Mining? A Multi-Dimensional

More information

Research on Data Mining Technology Based on Business Intelligence. Yang WANG

Research on Data Mining Technology Based on Business Intelligence. Yang WANG 2018 International Conference on Mechanical, Electronic and Information Technology (ICMEIT 2018) ISBN: 978-1-60595-548-3 Research on Data Mining Technology Based on Business Intelligence Yang WANG Communication

More information

An Efficient Clustering Method for k-anonymization

An Efficient Clustering Method for k-anonymization An Efficient Clustering Method for -Anonymization Jun-Lin Lin Department of Information Management Yuan Ze University Chung-Li, Taiwan jun@saturn.yzu.edu.tw Meng-Cheng Wei Department of Information Management

More information

Comparative Study of Apriori-variant Algorithms

Comparative Study of Apriori-variant Algorithms Comparative Study of Apriori-variant Algorithms Sofianita Mutalib, Ammar Azri Abdul Subar, Shuzlina Abdul-Rahman, and Azlinah Mohamed Universiti Teknologi MARA (Shah Alam), Malaysia, {sofi, shuzlina, azlinah}@tmsk.uitm.edu.my

More information

Study on Classifiers using Genetic Algorithm and Class based Rules Generation

Study on Classifiers using Genetic Algorithm and Class based Rules Generation 2012 International Conference on Software and Computer Applications (ICSCA 2012) IPCSIT vol. 41 (2012) (2012) IACSIT Press, Singapore Study on Classifiers using Genetic Algorithm and Class based Rules

More information

International Journal of Advance Engineering and Research Development. A Survey on Data Mining Methods and its Applications

International Journal of Advance Engineering and Research Development. A Survey on Data Mining Methods and its Applications Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 5, Issue 01, January -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A Survey

More information

QUALITATIVE MODELING FOR MAGNETIZATION CURVE

QUALITATIVE MODELING FOR MAGNETIZATION CURVE Journal of Marine Science and Technology, Vol. 8, No. 2, pp. 65-70 (2000) 65 QUALITATIVE MODELING FOR MAGNETIZATION CURVE Pei-Hwa Huang and Yu-Shuo Chang Keywords: Magnetization curve, Qualitative modeling,

More information

[Shingarwade, 6(2): February 2019] ISSN DOI /zenodo Impact Factor

[Shingarwade, 6(2): February 2019] ISSN DOI /zenodo Impact Factor GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES DEVELOPMENT OF TOP K RULES FOR ASSOCIATION RULE MINING ON E- COMMERCE DATASET A. K. Shingarwade *1 & Dr. P. N. Mulkalwar 2 *1 Department of Computer

More information

Restricted Nearest Feature Line with Ellipse for Face Recognition

Restricted Nearest Feature Line with Ellipse for Face Recognition Journal of Information Hiding and Multimedia Signal Processing c 2012 ISSN 2073-4212 Ubiquitous International Volume 3, Number 3, July 2012 Restricted Nearest Feature Line with Ellipse for Face Recognition

More information

A New Technique to Optimize User s Browsing Session using Data Mining

A New Technique to Optimize User s Browsing Session using Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Development of an interface that allows MDX based data warehouse queries by less experienced users

Development of an interface that allows MDX based data warehouse queries by less experienced users Development of an interface that allows MDX based data warehouse queries by less experienced users Mariana Duprat André Monat Escola Superior de Desenho Industrial 400 Introduction Data analysis is a fundamental

More information

Maintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept

Maintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and ata Bases, Corfu Island, Greece, February 16-19, 2007 142 Maintenance of Generalized Association Rules for

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK EFFICIENT ALGORITHMS FOR MINING HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASES

More information

Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4

Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4 5th International Conference on Advanced Engineering Materials and Technology (AEMT 205) Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu,a, Yanhua Gu 2,b

More information

Information Push Service of University Library in Network and Information Age

Information Push Service of University Library in Network and Information Age 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang

More information

A Data Mining Framework for Extracting Product Sales Patterns in Retail Store Transactions Using Association Rules: A Case Study

A Data Mining Framework for Extracting Product Sales Patterns in Retail Store Transactions Using Association Rules: A Case Study A Data Mining Framework for Extracting Product Sales Patterns in Retail Store Transactions Using Association Rules: A Case Study Mirzaei.Afshin 1, Sheikh.Reza 2 1 Department of Industrial Engineering and

More information

Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules

Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules Manju Department of Computer Engg. CDL Govt. Polytechnic Education Society Nathusari Chopta, Sirsa Abstract The discovery

More information

Application of Clustering as a Data Mining Tool in Bp systolic diastolic

Application of Clustering as a Data Mining Tool in Bp systolic diastolic Application of Clustering as a Data Mining Tool in Bp systolic diastolic Assist. Proffer Dr. Zeki S. Tywofik Department of Computer, Dijlah University College (DUC),Baghdad, Iraq. Assist. Lecture. Ali

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

Domain Specific Search Engine for Students

Domain Specific Search Engine for Students Domain Specific Search Engine for Students Domain Specific Search Engine for Students Wai Yuen Tang The Department of Computer Science City University of Hong Kong, Hong Kong wytang@cs.cityu.edu.hk Lam

More information

Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao Fan1, Yuexin Wu2,b, Ao Xiao1

Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao Fan1, Yuexin Wu2,b, Ao Xiao1 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao

More information

GPU-Accelerated Apriori Algorithm

GPU-Accelerated Apriori Algorithm GPU-Accelerated Apriori Algorithm Hao JIANG a, Chen-Wei XU b, Zhi-Yong LIU c, and Li-Yan YU d School of Computer Science and Engineering, Southeast University, Nanjing, China a hjiang@seu.edu.cn, b wei1517@126.com,

More information

The application of OLAP and Data mining technology in the analysis of. book lending

The application of OLAP and Data mining technology in the analysis of. book lending 2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2017) The application of OLAP and Data mining technology in the analysis of book lending Xiao-Han Zhou1,a,

More information

A Novel Method of Optimizing Website Structure

A Novel Method of Optimizing Website Structure A Novel Method of Optimizing Website Structure Mingjun Li 1, Mingxin Zhang 2, Jinlong Zheng 2 1 School of Computer and Information Engineering, Harbin University of Commerce, Harbin, 150028, China 2 School

More information

Deriving Trading Rules Using Gene Expression Programming

Deriving Trading Rules Using Gene Expression Programming 22 Informatica Economică vol. 15, no. 1/2011 Deriving Trading Rules Using Gene Expression Programming Adrian VISOIU Academy of Economic Studies Bucharest - Romania Economic Informatics Department - collaborator

More information

Efficient Algorithm for Frequent Itemset Generation in Big Data

Efficient Algorithm for Frequent Itemset Generation in Big Data Efficient Algorithm for Frequent Itemset Generation in Big Data Anbumalar Smilin V, Siddique Ibrahim S.P, Dr.M.Sivabalakrishnan P.G. Student, Department of Computer Science and Engineering, Kumaraguru

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE

DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE Saravanan.Suba Assistant Professor of Computer Science Kamarajar Government Art & Science College Surandai, TN, India-627859 Email:saravanansuba@rediffmail.com

More information

Knowledge Discovery in Data Bases

Knowledge Discovery in Data Bases Knowledge Discovery in Data Bases Chien-Chung Chan Department of CS University of Akron Akron, OH 44325-4003 2/24/99 1 Why KDD? We are drowning in information, but starving for knowledge John Naisbett

More information

A Review on Cluster Based Approach in Data Mining

A Review on Cluster Based Approach in Data Mining A Review on Cluster Based Approach in Data Mining M. Vijaya Maheswari PhD Research Scholar, Department of Computer Science Karpagam University Coimbatore, Tamilnadu,India Dr T. Christopher Assistant professor,

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

Construction of the Library Management System Based on Data Warehouse and OLAP Maoli Xu 1, a, Xiuying Li 2,b

Construction of the Library Management System Based on Data Warehouse and OLAP Maoli Xu 1, a, Xiuying Li 2,b Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 380-384, pp 4796-4799 doi:10.4028/www.scientific.net/amm.380-384.4796 2013 Trans Tech Publications, Switzerland Construction of

More information

Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process

Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process KITTISAK KERDPRASOP and NITTAYA KERDPRASOP Data Engineering Research Unit, School of Computer Engineering, Suranaree

More information

IJMIE Volume 2, Issue 9 ISSN:

IJMIE Volume 2, Issue 9 ISSN: WEB USAGE MINING: LEARNER CENTRIC APPROACH FOR E-BUSINESS APPLICATIONS B. NAVEENA DEVI* Abstract Emerging of web has put forward a great deal of challenges to web researchers for web based information

More information

Implementation of a wireless energy management and safety system

Implementation of a wireless energy management and safety system International Journal of Smart Grid and Clean Energy Implementation of a wireless energy management and safety system Cheng-Chien Kuo a, Han-Ching Lin b a Saint John s University, 499, Sec. 4, Tamking

More information

An Algorithm for Mining Frequent Itemsets from Library Big Data

An Algorithm for Mining Frequent Itemsets from Library Big Data JOURNAL OF SOFTWARE, VOL. 9, NO. 9, SEPTEMBER 2014 2361 An Algorithm for Mining Frequent Itemsets from Library Big Data Xingjian Li lixingjianny@163.com Library, Nanyang Institute of Technology, Nanyang,

More information

Tag Based Image Search by Social Re-ranking

Tag Based Image Search by Social Re-ranking Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

Data mining overview. Data Mining. Data mining overview. Data mining overview. Data mining overview. Data mining overview 3/24/2014

Data mining overview. Data Mining. Data mining overview. Data mining overview. Data mining overview. Data mining overview 3/24/2014 Data Mining Data mining processes What technological infrastructure is required? Data mining is a system of searching through large amounts of data for patterns. It is a relatively new concept which is

More information

Data Mining Download or Read Online ebook data mining in PDF Format From The Best User Guide Database

Data Mining Download or Read Online ebook data mining in PDF Format From The Best User Guide Database Free PDF ebook Download: Download or Read Online ebook data mining in PDF Format From The Best User Guide Database Vipin Kumar, Data mining course at University of Minnesota. Jiawei Han, slides of the

More information